Auswahl der wissenschaftlichen Literatur zum Thema „Access control“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Access control" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Access control"

1

Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Saunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (2001): 6–20. http://dx.doi.org/10.1145/506084.506085.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Abd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Penelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.

Der volle Inhalt der Quelle
Annotation:
Abstract Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a nu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Schuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (2011): 693. http://dx.doi.org/10.1038/nrm3220.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Subramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Friedman, Michael. "Access-control software." Computers & Security 7, no. 5 (1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Collinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.

Der volle Inhalt der Quelle
Annotation:
Almost all computing systems and applications in organizations include some form of access control mechanisms. Managing secure access to computing resources is an important but a challenging task, requiring both administrative and technical measures. This study examines the influence of administrative access control measures on technical access control mechanisms. Based on the four access control clauses defined by ISO/IEC27002, this study develops a model to empirically test the impact of access control policies on systems and applications control activities. The study employs Partial Least S
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ikponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.

Der volle Inhalt der Quelle
Annotation:
A face recognition system for automatic door access control has been developed in this work with a view to providing a relatively more robust and foolproof access control which can provide better security and reduce human errors inherent in other conventional methods. The system was designed with machine learning and artificial intelligence to capture faces, train faces with machine mode, and run trained faces to grant access to the user. The system uses the RaspberryPi module, camera module, servo motor and the GSM module which were all incorporated into the fabricated building to make up the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Access control"

1

SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.

Der volle Inhalt der Quelle
Annotation:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>O uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Atkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

May, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

de, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.

Der volle Inhalt der Quelle
Annotation:
Professional Access Control (PAC) is a self-administrating access control model for professional users which employs a peer review process and oversight by system administrators. It is characterised by the existence of ethical controls on the relationships between the users (those accessing data or granting access privileges to others) and data owners. Investigations revealed that the issue of availability was crucial to users in the hospital domain studied, and that to minimise the administrative burden on system administrators, the users needed to take some of the load. These factors led to
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.

Der volle Inhalt der Quelle
Annotation:
When classified data of different classifications are stored in a database, it is necessary for a contemporary database system to pass through other classified data to find the properly classified data. Although the user of the system may only see data classified at the user's level, the database system itself has breached the security by bringing the other classified data into the main memory from secondary storage. Additionally, the system is not efficient as it could be because unnecessary material has been retrieved. This is a problem in access precision. This thesis proposes a solution to
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.

Der volle Inhalt der Quelle
Annotation:
<p>Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patient’s treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant acce
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Macfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.

Der volle Inhalt der Quelle
Annotation:
In this thesis we propose two semantic ontological role-based access control (RBAC) reasoning processes. These processes infer user authorisations according to a set of role permission and denial assignments, together with user role assignments. The first process, SO-RBAC (Semantic Ontological Role-Based Access Control) uses OWL-DL to store the ontology, and SWRL to perform reasoning. It is based mainly on RBAC models previously described using Prolog. This demonstrates the feasibility of writing an RBAC model in OWL and performing reasoning inside it, but is still tied closely to descriptive
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Schmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Knight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Lukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.

Der volle Inhalt der Quelle
Annotation:
Approved for public release; distribution is unlimited<br>As networks grow in complexity and data breaches become more costly, network administrators need better tools to help design networks that provide service-level availability while restricting unauthorized access. Current research, specifically in declarative network management, has sought to address this problem but fails to bridge the gap between service-level requirements and low-level configuration directives. We introduce service-oriented access control, an approach that frames the problem in terms of maintaining service-level paths
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Access control"

1

Jenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Key Note, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Emily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Key Note, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Key Note, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Key Note, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Larson, Jessica Megan. Snowflake Access Control. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ferraiolo, David. Role-based access control. 2nd ed. Artech House, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Hoppenstand, Gregory S. Secure access control with high access precision. Naval Postgraduate School, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Boonkrong, Sirapat. Authentication and Access Control. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Mike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. Jordan, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Access control"

1

Malik, Waqar. "Access Control." In Learn Swift 2 on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

de Villiers, Sidriaan. "Access Control." In The Cyber Risk Handbook. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Yao, Jiewen, and Vincent Zimmer. "Access Control." In Building Secure Firmware. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Malik, Waqar. "Access Control." In Learn Swift on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ferrari, Elena. "Access Control." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_6-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Yang, Kan. "Access Control." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_289.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ferrari, Elena. "Access Control." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Pieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. "Access Control." In Fundamentals of Computer Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-07324-7_17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shekhar, Shashi, and Hui Xiong. "Access Control." In Encyclopedia of GIS. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yang, Kan. "Access Control." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_289-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Access control"

1

Naveena, Kolli, M. Suleman Basha, Chanda Sai Sathvik, Tadikamalla Revanth Mahajan, and Polepaka Nithin Emmanuel. "Enhancing Access Control in Cloud Storage through Sanitizable Access Control System." In 2024 International Conference on Computational Intelligence for Security, Communication and Sustainable Development (CISCSD). IEEE, 2024. https://doi.org/10.1109/ciscsd63381.2024.00042.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Barker, Steve. "Personalizing access control by generalizing access control." In Proceeding of the 15th ACM symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809866.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jaeger, Trent, Antony Edwards, and Xiaolan Zhang. "Managing access control policies using access control spaces." In the seventh ACM symposium. ACM Press, 2002. http://dx.doi.org/10.1145/507711.507713.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Osborn, Sylvia. "Mandatory access control and role-based access control revisited." In the second ACM workshop. ACM Press, 1997. http://dx.doi.org/10.1145/266741.266751.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Swaminathan, Kishore. "Negotiated Access Control." In 1985 IEEE Symposium on Security and Privacy. IEEE, 1985. http://dx.doi.org/10.1109/sp.1985.10019.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Lawson, Curt, and Feng Zhu. "Sentential access control." In the 50th Annual Southeast Regional Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184512.2184582.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Gehani, Ashish, and Surendar Chandra. "Parameterized access control." In the 4th international conference. ACM Press, 2008. http://dx.doi.org/10.1145/1460877.1460922.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Naldurg, Prasad, and Roy H. Campbell. "Dynamic access control." In the eighth ACM symposium. ACM Press, 2003. http://dx.doi.org/10.1145/775412.775442.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Cautis, Bogdan. "Distributed access control." In the 12th ACM symposium. ACM Press, 2007. http://dx.doi.org/10.1145/1266840.1266850.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Arnab, Alapan, and Andrew Hutchison. "Persistent access control." In the 2007 ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1314276.1314286.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Access control"

1

Gartmann, Rüdiger, and Bastian Schäffer, eds. License-Based Access Control. Open Geospatial Consortium, Inc., 2011. http://dx.doi.org/10.62973/11-018.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Stokes, E., D. Byrne, B. Blakley, and P. Behera. Access Control Requirements for LDAP. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2820.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Treado, Stephen J., Steven C. Cook, and Michael Galler. Distributed biometric access control testbed. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7190.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hu, Vincent C., David F. Ferraiolo, and D. Rick Kuhn. Assessment of access control systems. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.ir.7316.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Quirolgico, Stephen, Vincent Hu, and Tom Karygiannis. Access control for SAR systems. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7815.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Bierman, A., and M. Bjorklund. Network Configuration Access Control Model. RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8341.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Koskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hu, Vincent C. Blockchain for Access Control Systems. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8403-draft.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Hu, Vincent C. Blockchain for Access Control Systems. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8403.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Hu, Vincent C. Access Control for NoSQL Databases. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8504.ipd.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!